Last revised: January 2026

ITSP.10.171 Compliance Statement

Protecting Specified Information in Non-Government of Canada Systems and Organizations

DataPeak’s SaaS architecture, operational controls, and security governance are designed to align with the requirements defined in ITSP.10.171, published by the Canadian Centre for Cyber Security.

ITSP.10.171 provides guidance for protecting specified information—the Canadian analogue to U.S. Controlled Unclassified Information (CUI)—when handled by non-Government of Canada (non-GC) systems and organizations.

This page outlines how DataPeak supports federal departments, agencies, and contractors by aligning with the 17 ITSP.10.171 control families and enabling customers to meet confidentiality-focused safeguarding requirements.

1. Scope & Applicability

ITSP.10.171 applies to non-GC systems that handle, process, store, or transmit specified information, including systems that protect or support those components.

DataPeak supports alignment by providing a secure, multi-tenant SaaS platform with strong technical, administrative, and architectural safeguards.

This alignment applies to:

  • DataPeak systems that may process or store specified information

  • Underlying cloud infrastructure and inherited security controls

  • Operational processes that protect confidentiality and integrity

  • Customer-configurable security and access controls

Customers remain responsible for:

  • Proper classification of specified information

  • Configuration of identity providers and access policies

  • Definition of organization-defined parameters (ODPs)

  • Appropriate use of DataPeak’s security features

2. Summary of Alignment Across ITSP.10.171 Control Families

ITSP.10.171 Control Family

Access Control (AC)

Awareness & Training (AT)

Audit & Accountability (AU)

Configuration Management (CM)

Identification & Authentication (IA)

Incident Response (IR)

Maintenance (MA)

Media Protection (MP)

Personnel Security (PS)

Physical Protection (PE)

Risk Assessment (RA)

Security Assessment & Monitoring (CA)

System & Communications Protection (SC)

System & Information Integrity (SI)

Planning (PL)

System & Services Acquisition (SA)

Supply Chain Risk Management (SR)

3. Detailed Alignment by Control Family

3.1 Access Control (AC)

DataPeak enforces access controls consistent with ITSP.10.171 requirements for account management, access enforcement, least privilege, and session control.

  • SSO via SAML and OIDC

  • Mandatory MFA for privileged roles

  • Role-based access control (RBAC)

  • Device trust and IP allowlisting

  • Automatic session timeouts

  • Logging of privileged actions

Outcome: Only authorized users, devices, and processes can access specified information.

3.2 Awareness & Training (AT)

  • Annual security awareness training

  • Role-based training for engineering and operations

  • Phishing simulations

  • Insider-threat awareness

Outcome: Personnel understand their responsibilities for protecting specified information.

3.3 Audit & Accountability (AU)

  • Authentication, authorization, and data access logging

  • Immutable log storage

  • SIEM integration

  • Timestamp integrity and alerting

Outcome: Unauthorized activity can be detected and investigated.

3.4 Configuration Management (CM)

  • Infrastructure-as-Code (IaC)

  • Hardened OS and container baselines

  • Change control workflows

  • Configuration drift detection

Outcome: Systems remain secure, consistent, and auditable.

3.5 Identification & Authentication (IA)

  • MFA enforcement

  • Device authentication

  • OAuth2 for API access

  • Passwordless authentication options

  • Replay-resistant mechanisms

Outcome: Only authenticated users and devices gain access.

3.6 Incident Response (IR)

  • 24/7 on-call security team

  • Documented incident response plan

  • Incident monitoring and reporting

  • Tabletop exercises

  • Customer notification SLAs

Outcome: Incidents are rapidly detected, contained, and communicated.

3.7 Maintenance (MA)

  • Secure remote maintenance

  • Logged and monitored sessions

  • Pre-approved maintenance windows

  • Vendor access restrictions

Outcome: Maintenance activities do not compromise confidentiality.

3.8 Media Protection (MP)

  • No removable media usage

  • Encrypted storage

  • Secure deletion and sanitization

Outcome: Specified information is protected from unauthorized disclosure.

3.9 Personnel Security (PS)

  • Background checks

  • Role-based access provisioning

  • Automated offboarding

  • Privileged access reviews

Outcome: Only trusted personnel access sensitive systems.

3.10 Physical Protection (PE)

Inherited cloud provider controls include:

  • 24/7 surveillance

  • Multi-factor physical entry

  • Redundant power and cooling

  • Physical access logging

Outcome: Physical access is tightly controlled.

3.11 Risk Assessment (RA)

  • Annual risk assessments

  • Vulnerability scanning

  • Threat modeling

  • Risk response planning

Outcome: Risks are identified and mitigated.

3.12 Security Assessment & Monitoring (CA)

  • Annual penetration testing

  • Continuous monitoring

  • POA&M tracking

  • Security assessments

Outcome: Control effectiveness is maintained and improved.

3.13 System & Communications Protection (SC)

  • TLS 1.2+/1.3 encryption in transit

  • AES-256 encryption at rest

  • Network segmentation

  • WAF and DDoS protection

  • Key management services

Outcome: Confidentiality is preserved during transmission and storage.

3.14 System & Information Integrity (SI)

  • Flaw remediation and patching

  • Malware protection

  • Runtime monitoring

  • Security alerting

Outcome: Threats are detected and remediated quickly.

3.15 Planning (PL)

  • Security policies and procedures

  • System Security Plans (SSPs)

  • Rules of behaviour

  • Architecture and data flow documentation

Outcome: Security planning is structured and documented.

3.16 System & Services Acquisition (SA)

  • Secure SDLC practices

  • SBOM generation

  • Dependency scanning

  • Supplier vetting

Outcome: Systems are securely designed and procured.

3.17 Supply Chain Risk Management (SR)

  • Vendor risk assessments

  • Contractual security requirements

  • Continuous monitoring of critical suppliers

  • Cloud provider inheritance

Outcome: Supply chain risks are controlled and monitored.

4. Shared Responsibility Model

Area

Platform security

Infrastructure security

Identity provider configuration

Access policies

ODP definition

Data classification

Logging & monitoring

Logging & monitoring

DataPeak Alignment Summary

SSO, MFA, RBAC, least privilege, session controls, device trust

Annual training, secure-coding education, phishing simulations

Centralized logging, immutable storage, SIEM integration

Infrastructure-as-Code, hardened baselines, drift detection

MFA, OAuth2, device authentication, passwordless options

24/7 IR program, runbooks, tabletop exercises

Secure remote maintenance, logged sessions, vendor controls

No removable media, encrypted storage, sanitization

Background checks, role-based access, automated offboarding

Inherited cloud provider physical controls

Annual risk assessments, vulnerability scanning

Continuous monitoring, penetration testing, POA&M tracking

TLS 1.2+/1.3, encryption at rest, segmentation, WAF

Malware protection, patching SLAs, runtime monitoring

Security plans, rules of behaviour, data flow diagrams

Secure SDLC, SBOMs, supplier vetting

Vendor assessments, contractual controls

DataPeak Responsibility

Shared

Shared

✔ (inherited)

Customer Responsibility

Shared

Shared

5. Continuous Improvement

DataPeak continuously enhances its security posture through:

  • Regular control reviews

  • Threat intelligence integration

  • Continuous monitoring

  • Alignment with ITSP.10.033, NIST SP 800-171, and NIST SP 800-53

6. Documentation & Support

Customers may request additional documentation, including:

  • Security whitepapers

  • Architecture diagrams

  • Penetration test summaries

  • Data flow documentation

  • ODP tailoring guidance

Requests can be made through your account representative.

Official Standard References

Canadian Centre for Cyber Security – ITSP.10.171
https://www.cyber.gc.ca/en/guidance/protecting-specified-information-non-government-canada-systems-and-organizations-itsp10171

Official PDF (v4):
https://www.cyber.gc.ca/sites/default/files/itsp10171-e-v4.pdf

For questions, contact info@factr.me.

You may also view FactR Limited’s Privacy Policy and Terms & Conditions